SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
MCTS
Start Test
Study First
Subjects
:
certifications
,
mcts
,
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Are Migrated user accounts are enabled by default?
Boot Configuration Database - Boot Configuration Data (BCD) files provide a store that is used to describe boot applications and boot application settings. The objects and elements in the store effectively replace Boot.ini.
Specify this file with both the ScanState and LoadState commands to migrate application settings to computers running Windows Vista or Windows 7.
No they are disabled
Command to configure the TCP/IP settings.
2. How do you calculate the number of host addresses in a give subnet?
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
In Windows 7 and Windows Server 2008 R2 it enhances the productivity of mobile workers by connecting them seamlessly and more securely to their corporate network any time they have Internet access—without the need to VPN. When your IT department enab
Subtract the number of bits in the mask from 32 bits (255.255.255.255). Take the result (x) and have 2 to the power of the result (2^x). Subtract that final result by 2 and that is the amount of host addresses available.
WINRM QUICKCONFIG.
3. Where do you get the USMT?
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
Internet printing protocol. Used for connecting to printers via web browser.
Comes with the Windows Automated Installation Kit (WAIK)
3389
4. What is a HOSTS file?
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
To display friendly labels to capture packet address headers.
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
Verify that they are not within the scope of the dynamically assigned DHCP addresses.
5. What is Network Level Authentication?
Suggested Sites
Use dnscmd /zonerefresh.
Which processes currently consume a resource like processor utilization.
An authentication method that completes user authentication before you establish a full Remote Desktop connection and the logon screen appears. This can help protect the remote computer from hackers and malicious software.
6. What is Sysprep?
Through a GPO under Application Control Policies in the Computer Security Settings Node.
Default Programs Control Panel applet
Either from wbadmin or windows server backup.
It can be used to configure an unattended install of Windows 7. The answer file is now an XML file instead of an INF file. You should to use Windows System Image Manager to create the XML file. To use this XML file - copy it to c:windowssystem32syspr
7. What is a NAP policy?
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
driveletter:\\WindowsImageBackup\
Can be used to create virtual hard disks
It is a network health policy defines the minumum level of client health required to connect to the network.
8. How do you statically add a route to a route table?
It is a temporary wireless profile that doesn't validate the certificate of the remote authentication dial-in user service (RADIUS) server.
By the RRAS manager or from the command line. For the subnet you can either use the / command or the octet subnet. Example: Route -p add 192.168.1.0/24 192.168.1.1
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Extensive Authentication Protocol used in PPP authentication.
9. What OSs support SSTP?
A new feature for Offline Files & Folders. Prior to Windows 7 - to open a file across a slow network - client computers always retrieved the file from the server - even if the client computer had recently read the file. With Windows 7 transparent cac
Vista SP1 and Server 2008 and above.
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
It can speed up your computer by using storage space on most USB flash drives and flash memory cards. ReadyBoost is designed to help when your PC's memory is running low. Low memory can make your computer sluggish because Windows - which needs a plac
10. How do you configure client computers to use a WSUS server as the source for Windows Update?
Modify/Create a GPO
Yes
DNS suffix search lists
Run: Cscript slmgr.vbs /dl
11. What is the command line version of windows server backup?
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
Forward to another DNS server
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
wbadmin.exe. This can backup critical files.
12. What are the minimum hardware requirements for Windows 7?
Run: Cscript slmgr.vbs /dl
Does not have
1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor - 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit) - 16 GB available hard disk space (32-bit) or 20 GB (64-bit) - DirectX 9 graphics device with WDDM 1.0 or higher driver
Modifies the installation of a Windows Installer Package (.MSI) and can be invoked with MSIEXEC.EXE
13. You can configure process monitor alerts to _____.
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
Ping the Link Local Address (FE80 Address)
Run scripts
wbadmin.exe. This can backup critical files.
14. How can you secure file transfers across a network?
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
WINRM QUICKCONFIG.
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
15. Active directory DNS ____ replicate between forests.
Export and import it from another computer.
Does not
Through Group Policy at Computer configuration | Administrative Templates | Network | Offline Files | Enable Transparent Caching.
Uncheck IPV6 from the network properties.
16. What OSs disallow the uninstalliatin of IPV6?
Send email notifications
Windows Vista - Window 7 and Server 2008.
Configure the primary zone to transfer to only DNS servers listed on the names server tab or by ip address.
WPA-Personal (uses a preshared key)
17. How should EFS files should be recovered?
By an EFS Data Recovery Agent. If the computer is in a workgroup and the user has forgotten their password - the user should recover their own password with a Password Reset Disk in order to retain access to their encrypted files. If the administrato
Either by placing data on a web server and enforcing ssl to be used to download or by using IPSEC on a file share.
At the volume level - not the drive level.
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
18. What is InPrivate Browsing?
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
Client needs Remote Desktop Connection 6.0 or above - Client must use an os that supports CredSSP (Credential Security Support Providoer) - The terminal server must user windoes 2008 and above.
8 (bits 57 - 64) /64 Allows for 256 subnets in each site.
It enables you to surf the web without leaving a trail in Internet Explorer. This helps prevent anyone else who might be using your computer from seeing where you visited and what you looked at on the web. You can start InPrivate Browsing from the ne
19. Windows 9x ___________ an automatic update client.
Sent across the network
Does not have
It is submitted to Microsoft for "device signing" to ensure the driver was adequately tested and will not affect the integrity of the operating system. Critical files are digitally signed so that any changes to these may be easily detected. However n
Which processes currently consume a resource like processor utilization.
20. What port does RDP use?
Turn off the Log Spooler event on a print server.
Internet printing protocol. Used for connecting to printers via web browser.
3389
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
21. Why would you deploy an application compatibility database across multiple computers?
Enterprise Admins
an email address where the @ is replaced with a period.
So you can use a system management solution - such as Microsoft System Center Configuration Manager 2007 - to deliver the database to multiple computers and then use the SDBInst.exe command-line tool to install the database. The SDBInst command-line
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
22. How do you configure DHCP to ignore clients on a particular subnet?
Enterprise and Ultimate versions. The limitation refers only to the ability to enable protection on a removable storage device. Once BitLocker To Go is added to a storage device - that device can be used normally with any version of Windows 7. It can
By unbinding the DHCP protocol from the nic attached to the subnet.
It is the Microsoft SMB client for accessing shared network resources
dynamic drives
23. How do you connect to a wireless access point is not broadcasting its SSID?
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
It is a network health policy defines the minumum level of client health required to connect to the network.
wbadmin.exe. This can backup critical files.
By creating or modifying a wireless connection in Network and Sharing Center.
24. How do you export the DNS zone to a text file?
You start by selecting Windows XP Mode from the Windows 7 Start Menu. You can install applications in Windows XP Mode just as you normally would on a physical PC. For example - you can install applications via web - from storage devices - or from phy
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
Configure aging and scavenging.
By using the dnscmd /zoneexport command.
25. What are the ESRB Ratings?
Devices and Printers Control Panel applet has a
The system will shut down. The next time you start this system (after cloning it) - it will install with the settings in the XML file. The Computer Name will be automatically generated.
EARLY CHILDHOOD - EVERYONE - EVERYONE 10+ - TEEN - MATURE - ADULTS ONLY - RATING PENDING
It will display driver signing status
26. What has Windows 7 modified in searching?
Client computers must be running Windows 7 - with the BranchCache feature enabled. Web servers file servers must be running Windows Server 2008 R2 - with the BranchCache feature enabled.
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
Enabled searching for content on remote locations right from the Explorer itself. Integrating federated search into Windows gives users the benefits of using familiar tools and workflows to search remote data. This enhanced integration provides the a
27. How can you can prevent users from accessing certain MMC console snap ins?
Through a GPO.
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
A text-mode command interpreter that enables you to manage objects (disks - partitions - or volumes) by using scripts or direct input at a command prompt.
Use WPA with AES encryption. WPA-Personal requires a preshared key and WPA-Enterprise uses Radius Authentication.
28. What is PSR.EXE?
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
Contains a list of dynamically updated list of authorities for the zone.
RRAS-VPN/Dialup - Wireless Access Points - Terminal Server Gateway - DHCP - and IPSEC(HRA).
Problem Steps Recorder in the Windows 7 operating system is a feature that enables users to record their interactions with an application and provide a detailed screen-by-screen view with accompanying information including mouse clicks and keyboard i
29. Can users can share encrypted files with another user by giving them permission?
By unbinding the DHCP protocol from the nic attached to the subnet.
Yes - This involves picking the user certificate of the user you are sharing the file with. If that user does not already have a preinstalled certificate - then have them logon and encrypt a file for the first time and EFS will autogenerate a new cer
Netsh add dnsserver. Example netsh interface ipv4 add dnsserver name="Local Area Connection" 192.168.0.1 index=3
It which enables content from file and Web servers on a wide area network (WAN) to be cached on computers at a local branch office. BranchCache can improve application response time and reduce WAN traffic. Cached content can either be distributed acr
30. How do you setup Windows 7 setup to run unattended?
Drop both inbound and outbound traffic
Modify the PE image using DISM by adding the WINPE-Scripting package to BOOT.WIM
You create an answer file and place it on removable media. By default - Windows Setup will search the root directory of all removable media for an answer file called Autounattend.xml.
If your computer is running slowly or isn't working properly - you can use System Restore to return your computer's system files and settings to an earlier point in time using a restore point. For more information about System Restore - see System Re
31. What event viewer log is the Radius server (NPS) logs stored?
Encapsulating Security payload protocol used for encryption the packets created by the AH.
Configure the enforcement points as RADIUS clients.
The local security logs.
Yes - Removable Storage Access policies within a GPO can be used to restrict user's access to devices like USB drives - CDDVD drives - Floppy Disks - Tape Drives - etc.
32. How do you make a Windows 7 Answer File used for unattended setup?
They are written in XML and be created using the Windows System Image Manager or a text editor like notepad.
Promiscuous mode allows you to monitor another machine without installing network monitor on the PC you are trying to monitor.
Take the ip address and use the AND command on the calculator to AND the ip address and the subnet. NOTE: AND each octet separately. Then AND the gateway and the subnet. If the AND results are the same you are on the same subnet.
The latest Vista Service Pack
33. What version does Windows XP must have to be able to connect with Remote Desktop to a computer requiring network level authentication?
Use the Advanced Firewall to define Connection Security Rules.
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
Windows Aero was revised to be more touch-friendly.
SP3
34. What windows 7 OSs can join a domain?
Only Business Track Windows 7 editions (Professional - Enterprise - Ultimate).
Suggested Sites
Enterprise Admins
One of the tunnels if DirectAccess by using a computer certificate. This tunnel provides access to an intranet Domain Name System (DNS) server and domain controller - allowing the computer to download Group Policy objects and to request authenticatio
35. What can storage reports be used for?
Duplicate file identification - disk usage patterns - dormant files identification - and audit screening.
Each of the rule types. For example - the default rules for Executables are: Allow members of the local Administrators group to run all applications - Allow members of the Everyone group to run applications that are located in the Windows folder - Al
Create persistent connections to computers with POWERSHELL
By using the DISM command with a /Set-Edition option: Example: DISM /IMAGE:C:SAMPLE.WIM /Set-Edition:Ultimate
36. What do quota templates do?
SP3
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
Use the DHCPv6 to obtain both IPV6 addresses and additional configuration settings.
When the OS loads using MSCONFIG.EXE which is also known as the System Configuration tool.
37. NAP can be configured to ____________.
Enforce IPSEC on the network
Does not have
They relay the status on polices to the Security center for NAP to validate the system to use the network.
SP3
38. What should you modify of the NAP Agent client service if the computer needs to prove health status?
You can upgrade to a more advanced edition of Windows 7—say from Home Premium to Ultimate and take advantage of extra features while keeping your current programs - files - and settings intact.
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
Modify the service startup to automatic and also enable the proper NAP enforcement client (DHCP - EAP - RDGATEWAY - IPSEC).Configured for manual start by default.
They restrict disk space usage for users. If you modify the quota template it applies changes to all folders that the template is assigned.
39. When you install an application in Windows Virtual PC - Windows XP Mode - where does it automatically creates a Windows 7 Start Menu Shortcut under?
A CA users trust or they will get error messages when trying to securely access a web site. They can avoid the error by installing the CA certificate to the Trusted Root Certificate Store.
Schedule reports - monitor attempt to save unauthorized files - and generate reports instantly.
It is the Microsoft SMB client for accessing shared network resources
All Programs - Windows Virtual PC - Windows XP Mode Applications. To run your application directly from the Windows 7 desktop - just go to your Start menu.
40. What type of router can RRAS be configured as?
A user to submit a print job to a printer and manage their own print jobs through the "Manage Documents" permission granted to the Creator Owners Group. If you grant a user "Manage Documents" - then they can manage ALL jobs submitted to that printer.
Use IPCONFIG or Status Details for the Network Connection.
You need to specify the files on both command lines using the /i option. Unlike previous versions of USMT - the .xml files are not copied to the store. Because ScanState and LoadState need the .xml files to control the migration - you should specify
A LAN Router only or a LAN to WAN Router
41. What does NETSH BRANCHCACHE FLUSH do?
WIndows Update Server
Suggested Sites
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
Clear the content being cached
42. What does Windows XP Mode for Windows 7 makes it easy to do?
Install and run many Windows XP productivity applications directly from your Windows 7-based PC. It utilizes virtualization technology - such as Windows Virtual PC - to provide a virtual Windows XP Professional SP3 environment for Windows 7 so that o
Se a capture filter based on the mac address of the problem PC.
Enable remote management on a computer and create the proper inbound rules on the advanced firewall.
Configure a firewall rule to the specific port and block all connections.
43. How can you communicate accross the IPV6 accross a IPV4 network?
A file that can be used to perform FQDN name resolution in the absence of a DNS server.
Clicking and dragging a window to the right or left side of the desktop causes the window to fill the respective half of the screen. Snapping a window to the top of the desktop maximizes it. Resizing a window to touch the top or bottom edge of the sc
ISATAP Routers within an orginization - 6TO4 routers to transverse the internet - and TEREDO to traverse a NAT devise.
Setup a GlobalNames zone.
44. What is Aero Shake?
They need to be configured us use 802.1x RADIUS authentication
Yes
Shaking (quickly dragging back and forth) a window minimizes all other windows. Shaking it again brings them back.
Offline migration is a new scenario in which enables the ScanState tool to run inside a different Windows operating system than the Windows operating system from which ScanState is gathering files and settings.
45. How do you change the ReadyBoost configuration of a flash drive?
Restrict when a child can logon to a computer.
Not supported
Assign a ipsec policy to all computers - verify the computers can manually authenticate. Assign a client respond only IPSEC policy to the computers. Also either the request server or the security server need IPSEC polices assigned.
Plug in the drive and then select properties of the drive. You can make changes through the ReadyBoost tab.
46. How do you upgrade windows vista to windows 7?
Boot into Windows Vista to initiate a direct upgrade to Windows 7 - insert the Windows 7 setup DVD - run SETUP.EXE and choose the Upgrade option. Do not boot directly to the setup DVD.
They relay the status on polices to the Security center for NAP to validate the system to use the network.
The latest Vista Service Pack
Encapsulating Security payload protocol used for encryption the packets created by the AH.
47. Is the DHCP automatically authorized in active directory?
Usually if the DHCP server is installed as the ad server - if it is a member server then it needs to be assigned manually.
A tool for controlling the types of content that your computer can access on the Internet. After you turn on Content Advisor - only rated content that meets or exceeds your criteria can be viewed. You can adjust the settings to suit your preferences.
Ina periority orderd based on the permission in the priority list. The first policy that is marked True from the conditions is selected. This order of policies can affect weather or not a user can remote access (dialup - vpn - wireless).
Pool Active Directory.
48. What is Oscdimg?
Generates a space-estimate file called Usmtsize.txt. This option does not collect the user state. You must also specify /nocompress.
Set IE back to its default settings
Command-line tool for creating an image file (.iso) of a customized 32-bit or 64-bit version of Windows PE. You can then burn that .iso file to a CD-ROM or DVD-ROM. Oscdimg supports ISO 9660 - Joliet - and Universal Disk Format (UDF) file systems.
Use IPV6 Unique Local Addresses.
49. What does DISM /UNMOUNT-WIM /COMMIT do?
Us edit dnscmd /zoneupdatefromdns command.
Writes changes to a mounted WIM file - DISM /UNMOUNT-WIM /DISCARD will roll the changes back
Configure the enforcement points as RADIUS clients.
Comes with the Windows Automated Installation Kit (WAIK)
50. How do you route IPV6 traffic on your private network?
It can add a driver to an offline WIM image with the /Add-Driver option
It is a advertisement of a service. The record is configured with the service provided - a port number and weight?
Anew vpn protocol that uses SSL (port 443) for encryption.
Use IPV6 Unique Local Addresses.